Spelling suggestions: "subject:"computer networks"" "subject:"coomputer networks""
401 |
Distributed computation in computer networks /You, Ching-Liang. January 1983 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1983. / Typescript. Includes bibliographical references (leaves 129-137).
|
402 |
Design and implementation of a communications package to network a group of microcomputers /Kulkarni, Narayan J. January 1985 (has links)
Thesis (M.S.)--Rochester Institute of Technology, 1985. / Typescript. Includes bibliographical references and appendices.
|
403 |
A SIP security testing framework /Srinivasan, Hemanth Balaji, January 2008 (has links)
Thesis (M.S.)--University of Texas at Dallas, 2008. / Includes vita. Includes bibliographical references (leaves 70-71)
|
404 |
Performance analysis of network architecturesTutsch, Dietmar. January 1900 (has links)
Habilitation - Technische Universität, Berlin. / Includes bibliographical references (p. [223]-237) and index.
|
405 |
A test bed for detection of botnet infections in low data rate tactical networksBecker,Russell W. January 2009 (has links) (PDF)
Thesis (M.S. in Electrical Engineering)--Naval Postgraduate School, September 2009. / Thesis Advisor(s): JMcEachen, John ; Tummala, Murali. "September 2009." Description based on title screen as viewed on November 04, 2009. Author(s) subject terms: Botnet, Tactical Network, BotHunter, Honeynet, Honeypot, Low Data Rate, Network Security Includes bibliographical references (p. 57-59). Also available in print.
|
406 |
Evaluation of network performance of Microsoft operating systems. A dissertation submitted in partial fulfilment of the requirements for the degree of Master of Computing, Unitec New Zealand /Shi, Yi. January 2009 (has links)
Thesis (M.Comp.)--Unitec New Zealand, 2009. / Includes bibliographical references (leaves 106-112).
|
407 |
Internet use and scholars' productivityKaminer, N. January 1997 (has links)
Thesis (Ph. D.)--University of California, Berkeley, 1997. / eContent provider-neutral record in process. Description based on print version record. Includes bibliographical references (leaves 170-193).
|
408 |
Performance analysis of network architecturesTutsch, Dietmar. January 1900 (has links)
Habilitation - Technische Universität, Berlin. / Includes bibliographical references (p. [223]-237) and index.
|
409 |
An approach to a defense data network for the Saudi Ministry of Defense and AviationAl-Najashi, Abdulrahman Abdullah. January 1990 (has links)
Thesis (M.S. in Telecommunication System Management)--Naval Postgraduate School, December 1990. / Thesis Advisor(s): Poock, Gary K. Second Reader: Suh, Myung W. "December 1990." Description based on title screen as viewed on March 30, 2010. DTIC Descriptor(s): Computer programs, data transmission systems, communications networks, computers, theses, defense systems, networks DTIC Identifier(s): Computer networks, communications networks, computer communications, defense planning, military applications, Saudi Arabia, theses. Author(s) subject terms:DDN; Defense Data Network; Telecommunications Includes bibliographical references (p. 74-75). Also available in print.
|
410 |
Modeling and analyzing intrusion attempts to a comuter network operating in a defense-in-depth posture /Givens, Mark Allen. January 2004 (has links) (PDF)
Thesis (M.S. in Information Technology Management)--Naval Postgraduate School, Sept. 2004. / Thesis advisor(s): Alex Bordetsky, Joe Roth. Includes bibliographical references (p. 89-90). Also available online.
|
Page generated in 0.0719 seconds